Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
GRC/Cyber Insurance
Tell a Friend About This EventTell a Friend
GRC/Cyber Insurance

ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Web Conference Committee.

When: 2/18/2014
9:00 AM
Where: Web Conference - Register Today!

« Go to Upcoming Event List  

GRC/Cyber Insurance

2-Hour Live Event: Tuesday, February 18, 2014

Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here to register.

Generously supported by:

Web Conference Overview:

An effective governance, risk and compliance framework is key to successfully managing a business-aligned information security program, especially in this age of cloud computing, BYOD, ever changing regulation, and the ballooning privacy concerns / debate.

There is increasing pressure for the CISO (or whatever the acronym your organization uses) to be more aligned to the business and compliance objectives of the organization and not so much the IT that might be used to protect key assets and sensitive data.This can mean the CISO "day” is more about satisfying the needs for business governance than specific IT risks – in other words, it is time to take the techie hat off and learn to talk business.

In this session, we will discuss aspects of how the roles of organizations' senior information security people might be changing and what the impact might be for everyone else concerned.

Community Search
Sign In

Forgot your password?

Haven't registered yet?


Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

11/2/2016 » 11/3/2016
2016 ISSA International Conference

11/3/2016 » 11/4/2016
ISSA CISO Executive Forum - November 2016

CSCL Meetup: Mr. Robot – Can it Really Happen?

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information